Discover Security Events in Network Security
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
Network Security remains fundamental to cybersecurity despite dramatic changes in network architectures driven by cloud adoption, remote work, and software-defined networking. Traditional perimeter-based defenses have given way to distributed security models that protect data flows across hybrid environments, requiring new approaches to visibility, control, and threat prevention.
The dissolution of traditional network perimeters has fundamentally changed network security. Organizations now protect assets distributed across on-premises data centers, multiple cloud providers, branch offices, and remote workers. Software-defined wide area networks (SD-WAN), cloud-native architectures, and containerized applications create dynamic, ephemeral network environments challenging conventional security controls. Zero-trust network access (ZTNA) principles mandate verification of every connection attempt regardless of source location, replacing implicit trust models.
Next-generation firewalls, intrusion prevention systems, and network detection and response platforms employ deep packet inspection, behavioral analysis, and threat intelligence integration to identify sophisticated attacks. Encrypted traffic has become ubiquitous, requiring specialized inspection capabilities while respecting privacy requirements. Organizations deploy network segmentation, micro-segmentation, and software-defined perimeters to limit lateral movement and contain breaches.
Security teams struggle with maintaining comprehensive visibility across fragmented network environments. Shadow IT, unmanaged cloud services, and IoT devices create blind spots. Network security management requires coordinating policies across disparate platforms, correlating events from multiple sources, and adapting to constant infrastructure changes. Automation, orchestration, and AI-driven analytics have become essential for managing network security at scale while addressing the persistent cybersecurity skills shortage.
All security events are automatically streamed into this table on a daily basis.
4th December 2025 | From Gaps to Growth - Preparing for a New Era of Cyber Threats in 2026
This webinar examines the findings of the Fortinet 2025 Global Threat Landscape Report and explains how AI driven threats, cybercrime as a service and the link between cyber activity and organized crime are reshaping security worldwide. The session looks ahead to 2026 by shifting the focus from technology alone to the human networks, partnerships and intelligence sharing efforts that will influence how organizations defend themselves in the next phase of the threat landscape. Speakers will discuss changes in criminal behavior, the rise of automated attacks and how digital and traditional crime are becoming more closely connected. Attendees will hear from Crime Stoppers International and FortiGuard Labs experts as they outline emerging trends and practical ways to use intelligence driven strategies. The discussion explores how global cooperation helps disrupt criminal operations and why collaboration between cybersecurity teams and law enforcement is becoming essential. Participants will gain insights into how AI, automation and deepfakes are shaping cybercrime, along with FortiGuard Labs predictions for 2026 and the security priorities organizations should prepare for.
Company_Webinar • Part of Fortinet
4th December 2025 | Securing the AI Transformation in a Hyperconnected World
This webinar explains how AI is reshaping both innovation and cybercrime, and why organizations need modern security strategies to keep pace. Check Point CEO Nadav Zafrir will outline how the company’s Hybrid Mesh Network Architecture and AI security stack, strengthened through the Lakera acquisition, address today’s most urgent network security challenges. The session focuses on securing environments where traditional perimeters no longer apply.
Attendees will learn how hybrid mesh network security supports safe AI adoption, protects LLM development and secures connectivity across on premises, cloud and edge environments. The webinar also highlights how a prevention first approach and an open platform can reduce silos and create a more unified security stack. It is designed for teams looking to strengthen their overall network security posture.
Company_Webinar • Part of Check Point
11th December 2025 | 2025 Cyber Security Recap: Trends, Threats, and Takeaways Fireside Chat
This session gives security leaders a clear view of the major shifts that shaped 2025, with Check Point executives leading the discussion on what those changes mean for the year ahead. Nataly Kremer and Ruma Balasubramanian break down how AI driven threats evolved, which breakthroughs had the biggest impact and why resilience first architectures are becoming a priority for modern organizations.
The conversation explains how AI has changed both attacker tactics and defensive playbooks, then moves into Check Point’s top cybersecurity predictions for 2026 to help teams prepare early. Attendees will gain a practical understanding of the most influential threats, the architectural trends redefining enterprise security and the steps needed to stay ahead as the landscape continues to shift.
Company_Webinar • Part of Check Point
27th November 2025 | Check Point + Lakera: Redefining Security for the AI Era
This webinar explains why Check Point’s acquisition of Lakera matters for AI security and how the combined platform protects AI usage and runtime behavior across apps and agents. Speakers will cover what the deal means for enterprises globally and in APAC, and how the platform helps teams move from AI experimentation to operational confidence.
Attendees will also learn practical steps to reduce AI-related risk and receive a complimentary copy of the Check Point AI Security Report.
Company_Webinar • Part of Check Point
13th November 2025 | Discover Owl Talon v3.3: The Standard for Secure, One-Way Transfer
In this webinar, you will: • Learn about Owl Talon v3.3 and its advances in performance, security, and operational simplicity. • Explore Owl Talon’s file transfer use cases and capabilities, including practical applications across industrial, defense, and enterprise environments. • Have the opportunity to get your Owl Talon questions answered by our product expert.
Online • Part of Owl Cyber Defense